Thanks to visit codestin.com
Credit goes to github.com

Skip to content

nonexee/tella

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

99 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ›‘οΈ Tella AI - Offensive Security Testing Platform

Next-generation AI-powered offensive security testing with GPT-5 and multi-agent orchestration

Tella AI is an advanced, fully autonomous offensive security testing platform that leverages cutting-edge AI (GPT-5) to conduct comprehensive security assessments. Built with an attacker's mindset, it combines clean architecture with powerful security testing capabilities.

πŸš€ Features

Multi-Agent AI System

  • Orchestrator Agent: Coordinates all security testing activities
  • Recon Agent: Performs comprehensive reconnaissance
  • Scanner Agent: Identifies vulnerabilities systematically
  • Exploiter Agent: Validates findings with proof-of-concept exploits
  • Analyst Agent: Correlates and analyzes results
  • Reporter Agent: Generates detailed security reports

Security Testing Capabilities

  • πŸ” Reconnaissance: Subdomain enumeration, OSINT, technology fingerprinting
  • πŸ“‘ Port Scanning: Multi-technique port and service discovery
  • πŸ› Vulnerability Detection: XSS, SQLi, CSRF, SSRF, and more
  • πŸ’₯ Exploit Validation: Safe, controlled exploit testing
  • πŸ“Š Real-time Monitoring: Live agent status and findings
  • πŸ“ Comprehensive Reporting: Detailed findings with remediation

Technology Stack

  • Backend: TypeScript, Node.js, GraphQL, Prisma
  • Database: PostgreSQL
  • Queue: Redis + BullMQ
  • AI: OpenAI GPT-5 with function calling
  • Frontend: Svelte with real-time updates
  • Deployment: Docker & Docker Compose

πŸ“‹ Prerequisites

  • Node.js 18+
  • PostgreSQL 15+
  • Redis 7+
  • OpenAI API Key (GPT-5 when available, currently uses GPT-4 Turbo)
  • Docker & Docker Compose (for containerized deployment)

πŸ”§ Installation

Option 1: Docker Compose (Recommended)

  1. Clone the repository:
git clone <repository-url>
cd tella
  1. Generate secure .env file:
# Automated setup (recommended)
./scripts/generate-env.sh

# OR manually copy and edit
cp .env.docker .env
# Then edit .env and replace all placeholder values
  1. Configure environment variables in .env:

    • Required: Set JWT_SECRET (min 32 chars) - auto-generated by script
    • Required: Set POSTGRES_PASSWORD - auto-generated by script
    • Optional: Add your OPENAI_API_KEY for AI features
    • Optional: Update CORS_ORIGIN for production deployment
  2. Start the platform:

docker-compose up -d
  1. Access the dashboard:
http://localhost:5173

Security Note: Never commit your .env file. The JWT_SECRET and POSTGRES_PASSWORD must be unique and secure in production!

Option 2: Manual Setup

  1. Install dependencies:
npm install
  1. Set up database:
npm run prisma:migrate
npm run prisma:generate
  1. Seed initial data (optional):
npm run db:seed
  1. Start development server:
npm run dev

🎯 Usage

Creating a Security Scan

  1. Add a Target:

    • Navigate to "Targets" in the sidebar
    • Click "New Target"
    • Enter target URL and details
    • IMPORTANT: Only test authorized targets
  2. Start a Scan:

    • Go to "Scans"
    • Click "New Scan"
    • Select target and configure scan parameters
    • Start the scan
  3. Monitor Progress:

    • View real-time agent activity
    • Track task completion
    • See findings as they're discovered
  4. Review Findings:

    • Navigate to "Findings"
    • Filter by severity
    • Export reports

API Usage

GraphQL endpoint: http://localhost:4000/graphql

Example mutation to start a scan:

mutation StartScan {
  createScan(
    name: "Comprehensive Security Assessment"
    targetId: "target-uuid"
    config: {
      depth: "comprehensive"
      scanTypes: ["recon", "vuln_scan", "exploit"]
    }
  ) {
    id
    status
  }
}

πŸ—οΈ Architecture

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚           Tella AI Platform                     β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                                                 β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”      β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”        β”‚
β”‚  β”‚   Svelte UI  │◄────►│  GraphQL API β”‚        β”‚
β”‚  β”‚   Dashboard  β”‚      β”‚   (Apollo)   β”‚        β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜      β””β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”˜        β”‚
β”‚                               β”‚                 β”‚
β”‚                        β”Œβ”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”        β”‚
β”‚                        β”‚ Agent        β”‚        β”‚
β”‚                        β”‚ Orchestrator β”‚        β”‚
β”‚                        β””β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”˜        β”‚
β”‚                               β”‚                 β”‚
β”‚         β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”       β”‚
β”‚         β”‚                     β”‚        β”‚       β”‚
β”‚    β”Œβ”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”  β”Œβ”€β”€β”€β–Όβ”€β”€β”€β”€β”      β”‚
β”‚    β”‚ Recon   β”‚  β”‚ Scanner β”‚  β”‚Exploiterβ”‚      β”‚
β”‚    β”‚ Agent   β”‚  β”‚ Agent   β”‚  β”‚ Agent   β”‚      β”‚
β”‚    β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”¬β”€β”€β”€β”€β”˜      β”‚
β”‚         β”‚            β”‚            β”‚            β”‚
β”‚         β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜            β”‚
β”‚                      β”‚                         β”‚
β”‚              β”Œβ”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”€β”                β”‚
β”‚              β”‚  Security Tools β”‚                β”‚
β”‚              β”‚  (Recon, Scan,  β”‚                β”‚
β”‚              β”‚   Exploit)      β”‚                β”‚
β”‚              β””β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜                β”‚
β”‚                      β”‚                         β”‚
β”‚         β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”           β”‚
β”‚         β”‚            β”‚             β”‚           β”‚
β”‚    β”Œβ”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”     β”‚
β”‚    β”‚PostgreSQLβ”‚  β”‚  Redis  β”‚  β”‚  GPT-5  β”‚     β”‚
β”‚    β”‚   DB     β”‚  β”‚  Queue  β”‚  β”‚   API   β”‚     β”‚
β”‚    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜     β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

πŸ” Security & Ethics

⚠️ CRITICAL WARNING

This platform is designed for AUTHORIZED security testing ONLY.

  • βœ… Only test systems you own or have explicit written permission to test
  • βœ… Follow responsible disclosure practices
  • βœ… Comply with all applicable laws and regulations
  • ❌ NEVER use for unauthorized access or malicious purposes
  • ❌ NEVER test production systems without proper authorization

Safe Mode

By default, exploit testing runs in "safe mode" which validates vulnerabilities without causing damage. Aggressive testing requires explicit configuration and authorization.

πŸ“Š Database Schema

The platform uses a comprehensive schema:

  • Users & Auth: Role-based access control
  • Targets: Systems under test
  • Scans: Security assessment sessions
  • Agents: AI agents performing tasks
  • Tasks: Individual testing operations
  • Findings: Discovered vulnerabilities
  • Tools: Security testing tools
  • Knowledge Base: AI agent training data

πŸ€– Agent Capabilities

Orchestrator

  • Task coordination
  • Strategic planning
  • Progress monitoring

Recon

  • Subdomain enumeration
  • Technology fingerprinting
  • OSINT gathering
  • Certificate transparency

Scanner

  • Port scanning
  • Vulnerability detection
  • Configuration analysis
  • Header inspection

Exploiter

  • Exploit validation
  • PoC development
  • Attack chain testing

πŸ“ˆ Roadmap

  • GPT-5 integration (when available)
  • Advanced exploit modules
  • Custom security tool integration
  • Report customization
  • Multi-user collaboration
  • Distributed scanning
  • Machine learning for false positive reduction

🀝 Contributing

This is a security-focused project. Contributions are welcome but must:

  1. Follow secure coding practices
  2. Include tests
  3. Not introduce vulnerabilities
  4. Respect ethical guidelines

πŸ“„ License

This project is for educational and authorized security testing purposes only.

πŸ”— Resources

πŸ’¬ Support

For issues, questions, or feature requests, please open an issue on GitHub.


Built with an attacker's mindset. Used responsibly. πŸ›‘οΈ

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •